Comparison Overview

M42 Health

VS

Labcorp

M42 Health

None
Last Update: 2026-03-30
Between 750 and 799

M42 is an Abu Dhabi-based, global tech-enabled healthcare company operating at the forefront of medical advancement. The company is seeking to transform lives through innovative clinical solutions that can solve the world’s most critical health and diagnostic challenges. By harnessing unique medical and data-centric technologies, including genomics and AI, M42 is transforming the traditional healthcare ecosystem and delivering the highest level of precise, patient-centric, and preventative care. M42 has over 20,000 employees and more than 450 facilities in 26 countries around the world. M42 owns a wide portfolio of assets that includes Amana Healthcare, Biogenix Labs, Danat Al Emarat, Diaverum, HealthPoint Hospital, the HealthPlus network of specialty centers, Moorfields Eye Hospital Abu Dhabi, Imperial College London Diabetes Centre, Insights Research Organization & Solutions (IROS), Omics Center of Excellence and National Reference Laboratory, among others.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 16,168
Subsidiaries: 6
12-month incidents
0
Known data breaches
0
Attack type number
0

Labcorp

531 South Spring Street, Burlington, 27215, US
Last Update: 2026-03-29
Between 750 and 799

Clear and confident health care decisions begin with questions. At Labcorp, we’re constantly in pursuit of answers. As a global leader of innovative and comprehensive laboratory services, we help doctors, hospitals, pharmaceutical companies, researchers and patients make clear and confident decisions. We provide insights and advance science to improve health and improve lives through our unparalleled diagnostics and drug development laboratory capabilities. Our more than 60,000 employees serve clients in over 100 countries, worked on over 80% of the new drugs approved by the FDA in 2022 and performed more than 600 million tests for patients around the world. Learn more about Labcorp (NYSE: LH) at www.labcorp.com.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 41,367
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/m42-health.jpeg
M42 Health
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/labcorp.jpeg
Labcorp
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
M42 Health
100%
Compliance Rate
0/4 Standards Verified
Labcorp
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for M42 Health in 2026.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Labcorp in 2026.

Incident History — M42 Health (X = Date, Y = Severity)

M42 Health cyber incidents detection timeline including parent company and subsidiaries

Incident History — Labcorp (X = Date, Y = Severity)

Labcorp cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/m42-health.jpeg
M42 Health
Incidents

No Incident

https://images.rankiteo.com/companyimages/labcorp.jpeg
Labcorp
Incidents

Date Detected: 8/2018
Type:Breach
Blog: Blog

Date Detected: 07/2018
Type:Ransomware
Blog: Blog

FAQ

M42 Health company demonstrates a stronger AI Cybersecurity Score compared to Labcorp company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Labcorp company has historically faced a number of disclosed cyber incidents, whereas M42 Health company has not reported any.

In the current year, Labcorp company and M42 Health company have not reported any cyber incidents.

Labcorp company has confirmed experiencing a ransomware attack, while M42 Health company has not reported such incidents publicly.

Labcorp company has disclosed at least one data breach, while M42 Health company has not reported such incidents publicly.

Neither Labcorp company nor M42 Health company has reported experiencing targeted cyberattacks publicly.

Neither M42 Health company nor Labcorp company has reported experiencing or disclosing vulnerabilities publicly.

Neither M42 Health nor Labcorp holds any compliance certifications.

Neither company holds any compliance certifications.

M42 Health company has more subsidiaries worldwide compared to Labcorp company.

Labcorp company employs more people globally than M42 Health company, reflecting its scale as a Hospitals and Health Care.

Neither M42 Health nor Labcorp holds SOC 2 Type 1 certification.

Neither M42 Health nor Labcorp holds SOC 2 Type 2 certification.

Neither M42 Health nor Labcorp holds ISO 27001 certification.

Neither M42 Health nor Labcorp holds PCI DSS certification.

Neither M42 Health nor Labcorp holds HIPAA certification.

Neither M42 Health nor Labcorp holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X